Kjell Hausken

Orcid: 0000-0001-7319-3876

According to our database1, Kjell Hausken authored at least 80 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Review of Axioms for Group Contest Success Functions.
Int. J. Strateg. Decis. Sci., 2022

Theoretic Model of Adversaries and Media Manipulation: A Two-Period Extension.
IGTR, 2022

2021
The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty.
Reliab. Eng. Syst. Saf., 2021

Government intervention to combat the dynamics of terrorist organizations.
J. Oper. Res. Soc., 2021

Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits.
Inf. Syst. Frontiers, 2021

Governments Playing Games and Combating the Dynamics of a Terrorist Organization.
IGTR, 2021

Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency.
Games, 2021

2020
Governmental combat of migration between competing terrorist organisations.
Oper. Res. Decis., 2020

Game theoretic analysis of ideologically biased clickbait or fake news and real news.
Oper. Res. Decis., 2020

Cyber resilience in firms, organizations and societies.
Internet Things, 2020

Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention.
Int. J. Strateg. Decis. Sci., 2020

A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling.
Games, 2020

2019
Governmental combat of the dynamics of multiple competing terrorist organizations.
Math. Comput. Simul., 2019

Defence and attack of complex interdependent systems.
J. Oper. Res. Soc., 2019

A Game Theoretic Model of Adversaries and Media Manipulation.
Games, 2019

Principal-Agent Theory, Game Theory, and the Precautionary Principle.
Decis. Anal., 2019

2018
Defense Strategies for Asymmetric Networked Systems with Discrete Components.
Sensors, 2018

Proactivity and Retroactivity of Firms and Information Sharing of Hackers.
IGTR, 2018

2017
Special versus general protection and attack of parallel and series components.
Reliab. Eng. Syst. Saf., 2017

Information Sharing Among Cyber Hackers in Successive Attacks.
IGTR, 2017

Security Investment, Hacking, and Information Sharing between Firms and between Hackers.
Games, 2017

Defense and attack for interdependent systems.
Eur. J. Oper. Res., 2017

On defense strategies for system of systems using aggregated correlations.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

Defense strategies for asymmetric networked systems under composite utilities.
Proceedings of the 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2017

Game-theoretic strategies for asymmetric networked systems.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
How Elections are Impacted by Production, Economic Growth and Conflict.
IGTR, 2016

The strategic interaction between a company and the government surrounding disasters.
Ann. Oper. Res., 2016

Game-theoretic strategies for systems of components using product-form utilities.
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016

Defense strategies for infrastructures with multiple systems of components.
Proceedings of the 19th International Conference on Information Fusion, 2016

2015
A game theoretic model of economic crises.
Appl. Math. Comput., 2015

2014
Optimal defense with variable number of overarching and individual protections.
Reliab. Eng. Syst. Saf., 2014

Returns to information security investment: Endogenizing the expected loss.
Inf. Syst. Frontiers, 2014

Individual versus overarching protection and attack of assets.
Central Eur. J. Oper. Res., 2014

2013
Defending Threshold Voting Systems With Identical Voting Units.
IEEE Trans. Reliab., 2013

Individual vs. overarching protection for minimizing the expected damage caused by an attack.
Reliab. Eng. Syst. Saf., 2013

Defending majority voting systems against a strategic attacker.
Reliab. Eng. Syst. Saf., 2013

Is it wise to leave some false targets unprotected?
Reliab. Eng. Syst. Saf., 2013

Defending and attacking a network of two arcs subject to traffic congestion.
Reliab. Eng. Syst. Saf., 2013

Defence resource distribution between protection and decoys for constant resource stockpiling pace.
J. Oper. Res. Soc., 2013

The impact of disaster on the strategic interaction between company and government.
Eur. J. Oper. Res., 2013

Parallel systems under two sequential attacks with contest intensity variation.
Central Eur. J. Oper. Res., 2013

Combined Series and Parallel Systems subject to Individual versus Overarching Defense and Attack.
Asia Pac. J. Oper. Res., 2013

2012
Data survivability vs. security in information systems.
Reliab. Eng. Syst. Saf., 2012

Parallel systems under two sequential attacks with imperfect detection of the first attack outcome.
J. Oper. Res. Soc., 2012

Individual <i>versus</i> overarching protection against strategic attacks.
J. Oper. Res. Soc., 2012

The timing and deterrence of terrorist attacks due to exogenous dynamics.
J. Oper. Res. Soc., 2012

Terrorism risks, civil liberties, and privacy concerns.
Int. J. Crit. Infrastructures, 2012

On the Impossibility of Deterrence in Sequential Colonel Blotto Games.
IGTR, 2012

2011
Is it wise to protect false targets?
Reliab. Eng. Syst. Saf., 2011

Preventive strike vs. false targets and protection in defense strategy.
Reliab. Eng. Syst. Saf., 2011

Protecting complex infrastructures against multiple strategic attackers.
Int. J. Syst. Sci., 2011

Active vs. Passive Defense against a Strategic Attacker.
IGTR, 2011

Game Theoretic Analysis of Two-Period-Dependent Degraded Multistate Reliability Systems.
IGTR, 2011

Defending against multiple different attackers.
Eur. J. Oper. Res., 2011

Governments' and Terrorists' Defense and Attack in a <i>T</i>-Period Game.
Decis. Anal., 2011

Shield versus sword resource distribution in K-round duels.
Central Eur. J. Oper. Res., 2011

Active and Passive Defense against Multiple Attack Facilities.
Asia Pac. J. Oper. Res., 2011

Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures.
Ann. Oper. Res., 2011

2010
Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems.
Reliab. Eng. Syst. Saf., 2010

Defense and attack of complex and dependent systems.
Reliab. Eng. Syst. Saf., 2010

Defence and attack of systems with variable attacker system structure detection probability.
J. Oper. Res. Soc., 2010

Separation in homogeneous systems with independent identical elements.
Eur. J. Oper. Res., 2010

2009
Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts.
IEEE Trans. Reliab., 2009

Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Trans. Reliab., 2009

Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliab. Eng. Syst. Saf., 2009

Meeting a demand vs. enhancing protections in homogeneous parallel systems.
Reliab. Eng. Syst. Saf., 2009

Parallel systems under two sequential attacks.
Reliab. Eng. Syst. Saf., 2009

False targets vs. redundancy in homogeneous parallel systems.
Reliab. Eng. Syst. Saf., 2009

Protection vs. false targets in series systems.
Reliab. Eng. Syst. Saf., 2009

Minmax defense strategy for complex multi-state systems.
Reliab. Eng. Syst. Saf., 2009

False targets efficiency in defense strategy.
Eur. J. Oper. Res., 2009

2008
Protection vs. redundancy in homogeneous parallel systems.
Reliab. Eng. Syst. Saf., 2008

Strategic defense and attack for reliability systems.
Reliab. Eng. Syst. Saf., 2008

Whether to attack a terrorist's resource stock today or tomorrow.
Games Econ. Behav., 2008

Strategic defense and attack for series and parallel reliability systems.
Eur. J. Oper. Res., 2008

2007
Strategic Defense and Attack of Complex Networks.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

2006
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability.
Inf. Syst. Frontiers, 2006

2004
Formalization of Multi-Level Games.
IGTR, 2004

2002
Stochastic conditional and unconditional warfare.
Eur. J. Oper. Res., 2002

2001
The value of a player in n-person games.
Soc. Choice Welf., 2001


  Loading...